Welcome!

Security through Intelligence

Adam Vincent

Subscribe to Adam Vincent: eMailAlertsEmail Alerts
Get Adam Vincent via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Adam Vincent
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat and risk analysis. Security team efforts haven’t been integrated, or if they are integrated, it is only through rudimentary tech...
Last week President Obama announced and signed an executive order to encourage companies to share their cyber threat information and launched the Cyber Threat Intelligence Integration Center (CTIIC). This of course draws comparisons and criticisms to the current ISAC models and more, b...
Recently, Forrester analyst Rick Holland brought up the point of quality vs. quantity when it comes to threat indicators. We agree, the focus should never be on the quantity of data, it should be on the quality of data. So the question becomes, where and how can you gather or make sens...
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech Ventures is one of the premier East Coast venture capital firms and we are excited to ha...
Last Friday at ICS-ISAC’s Fall Conference, I participated on a panel with Aharon Chernin and Johan Rambi that discussed STIX/TAXII and Avalanche.  As a recap, STIX is an emerging standard to describe Cyber Threat Intelligence.  TAXII is a protocol/service that allows STIX XML instances...
August 18, 2014 By: Kelly Jackson Higgins A look at Operation Arachnophobia, a suspected cyber espionage campaign against India. A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage. Operation Arachnophobia, a campaign that...
August 6, 2014 By: Joseph Marks With help from David Perera, Tal Kopan and Shaun Waterman MORE THAN 1 BILLION PASSWORDS STOLEN BY RUSSIAN HACKER GANG — Last night’s New York Times scoop that a gang of criminal hackers deep in the Russian hinterlands had amassed more than 1 billion user...
Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform.  He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep...
“Crowdsourcing Intelligence” sounds like an oxymoron – you know – like Jumbo Shrimp, Military Intelligence or Living Dead – a figure of speech involving contradictory terms.  But that’s exactly what Cyber Squared’s founder and CEO set out to do two years ago.  A veteran of the security...
The RSA conference this year was abuzz with talk of threat intelligence and its usage in detecting and protecting against more advanced threats. There was re-branding of existing products and the entrance of new products, all of which claimed to support some type of “intelligence...
Bloomberg ran a Cyber Espionage piece called, “Hackers Linked To China’s Army Seen from EU to D.C” on July 26 that featured information derived from Cyber Squared’s Project Enlightenment.  In response to the article, Bloomberg TV’s “First Up” program hosted a live interview with ...
Cyber Squared’s Project Enlightenment webinar, “Anatomy of a sophisticated cyber-attack and how it affects your organization”, which is scheduled for May 30th will feature two victim use cases. For those of you unfamiliar with Project Enlightenment, it was a six month investigation abo...
Cyber Squared Webinar Will Share Project Enlightenment Study Details and Reinforce the Need for Organizations to Step Up their Cyber Security Measures In response to growing interest in their Project Enlightenment Case Study, Cyber Squared has scheduled a webinar, “Anatomy of a sophist...
Cyber-attacks make headlines on a daily basis.   The news media commands attention by publicizing high profile cases – well-known companies, enormous losses, and serious consequences.   With all the focus on the big guys, it’s easy to overlook the fact that no business demographi...
Pulling out your phone to check the football game score for your Alma mater on a Saturday is very tempting.  And if you’ve missed the game, it’s so nice to hop on your pc or tablet once you’re home to catch the game’s highlights.  Proceed with caution. Before you online shop or catch-u...
The home computer is used for everything these days – from surfing the web, playing video games, paying bills, downloading music and movies, shopping, social networking with family and friends, and so much more.  Today’s home computer is in constant demand in most households, and...
One of the more overlooked innovations of the computer industry is the ability to communicate without wires.  Walking around the office without being tethered to a wired network connection is oh-so convenient.  This technology has revolutionized personal, mobile and inter-office collab...
Ah, those popular little black devices that fit in the palm of your hand with keypads to handle corporate emails (produced by Research in Motion (RIM)) are all over the globe these days.   Rich features facilitate instant messaging, better known as BB Messenger, web browsing, email pro...
This holiday season many will be unwrapping a new iDevice. For some, an iPhone or an iPad is a slightly newer version of an old favorite, but for others the world of Apple mobile computing is uncharted territory. By applying a few simple security techniques, you can extend sound comput...
The holidays are almost here!  With discounts expected at most retailers, it’s likely that Internet-enabled gadgets will be on the top of everyone’s wish and gift giving lists. Cyber Squared wants to promote safe computing practices during the holidays and throughout the year, so we ar...
I was part of a panel titled “Developing Security Strategies to Successfully Combat Sophisticated Threats to your Network, while Protecting Customer Privacy” at the TM Forum conference two weeks ago. Given the topic, and the interesting conversation, I wanted to highlight some of the ...
Google recently reported the possibility of a Man-In-The-Middle (MITM) attack using fraudulent SSL certificates issued by DigiNotar.  The attack affected people logging into Google’s popular email services from Iran, and google has responded by rejecting all the Certificate Autho...
The existence of a persistent cyber-espionage threat to the military, government, and defense contractors is nothing new. While the ability of these organizations to react and remediate attacks against their networks is still often demonstrably lacking, there is now at least some level...
In the last week Lockheed Martin, then L-3 Communications Holdings have been in the news due to sophisticated cyber attacks on their networks by unknown actors. Now there are rumors that Northrop Grumman may have been targeted as well, since the company shut down remote access to the c...
In the last week Lockheed Martin, then L-3 Communications Holdings have been in the news due to sophisticated cyber attacks on their networks by unknown actors.
In the wake of the most highly coveted cyber security conference in the world – The RSA Conference, RSA has reported that they have been the victim to a highly sophisticated cyber attack. RSA, the world’s leader in security products and solutions, utilized by countless cust...
In the wake of the most highly coveted cyber security conference in the world - The RSA Conference, RSA has reported that they have been the victim to a highly sophisticated cyber attack. RSA,
Problems with NIEM Enablement There are several barriers to adoption of NIEM that must be dealt with. The first is that Data is currently represented in terms that the enterprise has defined and semantics likely differ between NIEM and the currently leveraged legacy data formats. Secon...
Problems with NIEM Enablement
The 9/11 Commission Report cited “pervasive problems of managing and sharing information across a large and unwieldy government that had been built in a different era to confront different dangers”. Since 9/11 governments around the world have considerably adjusted their st...
The 9/11 Commission Report cited "pervasive problems of managing and sharing information across a large and unwieldy government that had been built in a different era to confront different
Next Tuesday at TMForum Management World Americas conference in Orlando, I'll be presenting along
Next Tuesday at TMForum Management World Americas conference in Orlando, I’ll be presenting along with Sriram Chakrapani, (Chief, Integration Engineering Division, DISA) a presentation titled Policy Enabled Net-Centric Information Sharing. Due to this, and a whitepaper I’m ...
On Monday this week there was a very interesting post by Andy Greenberg a blog writer for Forbes.com which introduces a botnet herd standing by for payment and targeting instructions to launch a powerful Distributed Denial of Service (DDoS) attack. It appears based on his research that...
The United States Senate sent President Obama a letter on July 1st. The letter spoke of the criticality of securing our nation’s information systems, communications networks, and critical infrastructure, and states that there is an urgent need for action to address the vulnerabil...
What is Federated Monitoring? A wise man once told me that there is a big difference between reachability and availability. Ever since I have been fascinated by the challenges that we face with net-centric information sharing and service dependencies which cross all forms of organizati...
In the wake of CNN's airing of the two-hour special, We Were Warned: Cyber Shockwave, which stunned much of